The videos in this collection are from ShmooCon 2017, which occurred on 13-15 January 2017, at the Washington Hilton Hotel.
Friday - 13 January 2017 Talks (One Track Mind):
Opening Remarks, Rumblings, Ruminations, and Rants
Conor Patrick - U2F Zero: Secure Hardware Design, DIY Mass Production, and Amazon Prime
Space Rogue - 35 Years of Cyberwar: The Squirrels are Winning
Kenny McElroy - Implantable Logic Analyzers and Unlocking Doors
Jeff Dodge - Cyborg Self-Hacking: An Examination of Cochlear Implants
Chris DiLorenzo - Introducing Jak: Safely Share Sensitive Files via Git
Tommy Chin and Peter Muller - Can a Drunk Person Authenticate Using Brainwaves?
Keynote - Dr. Gary McGraw - Seven Things: Frank Zappa, T. Coraghassen Boyle, and Twenty-one Years in Security
Various - Firetalks (see subset below):
Jason Blanchard - How to Spoil all Movies and Give an Unforgettable Presentation
Travis Goodspeed - Quick and Dirty Emulation of ARM Firmware
Peter Clemenko - NAVRIE Athena: A graph database solution to unify InfoSec data and workflow
Charlie Vedaa - 22 Short Films About Security
John Willis - Slash AppSec Costs, Free Threat Modeling & Compliance Data Output
Brendan O’Connor - You Can Do the Thing!
Saturday - 14 January 2017 Talks (Build It!, Belay It! and Bring it On!):
Marc Newlin and Matt Knight - So You Want to Hack Radios
Falcon Darkstar Momot and Sergey Bratus - LangSec for Penetration Testing: How and Why
Brian David Johnson and Natalie Vanatta - A Widening Attack Plain: Threatcasting Tomorrow’s Threats
Dominic Spill and Michael Ossmann - Exploring The Infrared World
Allan Friedman, Nick Leiserson, Eric Mill, and Jessica Wilkerson - Ask the Feds
David Wu and Sergey Bratus - A Context-Aware Kernel IPC Firewall for Android
Brian Redbeard and Brad Ison - Who Wants to Allow Arbitrary Code Execution on Their Boxes? We Do It Every Day.
Kurt Opsahl and Andrew Crocker - Ask the EFF: Protecting Tomorrow
Paul Clark - WaveConverter: An Open Source Software Tool for RF Reverse Engineering
Whitney Merrill and Aaron Alva - Goodnight Moon & the House of Horrors: A look at the current IoT ecosystem and the regulations trying to control it
Allison Miller, Melissa Clarke, and Margaret Schedel - h·cek: Computing a Hacker Experience
Nicolas Kseib and Shimon Modi - I Have a Graph Database. Now What?
Rebekah Houser - Plug-in Electric Vehicle Fingerprinting: Authentication for Plug-in Electric Vehicles
Lauren Pearce - Flailing is Learning: My First Year as a Malware Analyst
The Shmoo Group - 0wn the Con
Alexander Chailytko and Stanislav Skuratovich - Defeating Sandbox Evasion: How to Increase Successful Emulation Rate in Your Virtualized Environment
Nikita Borisov and Sze Chuen Tan - The State of Secure Messaging
Andrew White and Jesse Kriss - User Focused Security at Netflix: Stethoscope
Gal Shpantzer and G. Mark Hardy - Anti-Ransomware: Turning the Tables
Matt Blaze - The Metadata is the Message (and Sometimes the Message is the Metadata
Sunday - 15 January 2017 Talks (Build It!, Belay It! and Bring it On!):
Patrick Biernat - ripr: Run Slices of Binary Code from Python
Brandon Creighton - Dig Out Your Brick Phone! Bringing AMPS Back with GNU Radio
Ryan Castellucci - A Nickel Tour of the Ad Fraud Ecosystem
Rich Seymour - Safety Bot Guaranteed
Brian Cardinale - Excuse me, Server, Do You Have the Time?
Mark Kuhr - The Threat Intel Results are in… You are NOT the hacker! : Disinformation Campaigns vs. Attribution Claims
Sebastian Verschoor - (In-)secure messaging with SCIMP and OMEMO
Toni Gidwani - Does a BEAR Leak in the Woods? The Democratic National Committee breach, Russian APTs, and the 2016 U.S. Election
Anil Karmel and Andrew Wild - Challenges and Opportunities: Application Containers and Micro Services
Tim Vidas, Chris Eagle, Jason Wright, Brian Caswell, Mike Thompson, and Holt Sorenson - Designing and Executing the Worldís First All-Computer Hacking Competition: A panel with the development team
Closing Remarks